
And it appears the IP address in question belongs to the National Security Agency (NSA). This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. Malware planted on the servers of Freedom Hosting- the "hidden service" hosting provider on the Tor anonymized network brought down late last week-may have de-anonymized visitors to the sites running on that service. They still maintain that there is a high likelihood of a connection, but admit their read of the data that led to the conclusions does not match up with the analysis of others who looked at the data sources later. Update April 7, 2013: The researchers at Baneki and Cryptocloud have heavily revised their findings, backing off claims of an explicit connection between the IP addresses associated with malware that attacked Tor browser users and the National Security Agency. GCHQ tried to track Web visits of “every visible user on Internet”.Snowden to President Obama: I deserve a pardon.Snowden’s bias is blatant-but Gordon-Levitt makes its message powerful.

